Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    27-07-2024 13:26

General

  • Target

    78521eb256a2f89d5e4affb11f5aa53d_JaffaCakes118.exe

  • Size

    320KB

  • MD5

    78521eb256a2f89d5e4affb11f5aa53d

  • SHA1

    0a47a94ca1d8f3daff8ea27904144d7b360a18a2

  • SHA256

    dea7f5828ceb9d5eec4dd8b27f5798e129312eb2442f944a7331f6a591445a05

  • SHA512

    e018833d58fe8b5a834a6c7bd66c3d20522ffd18d38dd61bc620941f0c8c85a9040d1307946e7ea5cd162c0a94eef584fee2ec89536aa1abaff0b26cdd771ca2

  • SSDEEP

    6144:Hy/03/pn/NbYl/a+fCf8SLJOIrhTyMMGRVq:S/0xn/NH+qL8nMMsV

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78521eb256a2f89d5e4affb11f5aa53d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\78521eb256a2f89d5e4affb11f5aa53d_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Users\Admin\tiamew.exe
      "C:\Users\Admin\tiamew.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\tiamew.exe

    Filesize

    320KB

    MD5

    71dae735c70c9e0bbd7ef798a652e235

    SHA1

    1f20222285cb52966499d40f7dcef09d433139ae

    SHA256

    7207e71207da858ccb000dad8ddcc62cfe208b6f03fd60f5a46ab369344ff69d

    SHA512

    c8ccdf85b600e22fdb3511422e57880db6bb9020d8ff9de0e59521e0bd0c0f637c73461fbd1eb32f0f1b93b7ac8c1def5b9cd3ea0cbe28291858f9a1404c61e6